Retrieves, updates, deletes, imports, and exports information in the IKE database.
ikedb -p[F s] [ -e entity-file ] [ XML-file ]
ikedb -g[r] [ -t type [ -n name | -i ID -y ID-type ] ]
ikedb -d -t type [ -n name | -i ID -y ID-type ]
ikedb -c[F] [ -l linux-file ] [ -k secrets-file ] [ -f XML-file ]
ikedb -x
ikedb -o
ikedb –R LDAP -p [ -F ]
ikedb –R LDAP -g [ policy-name ]
ikedb –R LDAP -o
ikedb –R LDAP -A <policy-name> [ -f <xml file name> ] [ -h ip/host ] -C <Dn Name>
ikedb –R LDAP -D <policy-name> [-h ip/host ] [ -F ]
The ikedb command allows the user to write to (put) or read from (get) the IKE database. The input and output format is an Extensible Markup Language (XML) file. The format of an XML file is specified by its Document Type Definition (DTD). The ikedb command allows the user to see the DTD that is used to validate the XML file when doing a put. While entity declarations can be added to the DTD using the -e flag, this is the only modification to the DTD that can be made.
Any external DOCTYPE declaration in the input XML file will be ignored and any internal DOCTYPE declaration might result in an error. The rules followed to parse the XML file using the DTD are specified in the XML standard. /usr/samples/ipsec has a sample of what a typical XML file that defines common tunnel scenarios looks like.
To use LDAP supported operations, configure the host as an LDAP client.
Item | Description |
---|---|
-p | Performs a put, which writes to the database, based on the given XML-file.
|
-h | You can specify hostname (or) IP address can be IPv4 (or) IPv6 along with -A option (or) -D option. |
-g | Performs a get,
which displays what is stored in the IKE database. Output is sent
to stdout and is in XML format, which is suitable for processing
with ikedb -p.
|
-d | Performs a delete on the specified item from the database. The flags are the same as for the -g flag, except that -r is not supported. |
-C | Used to provide the IPSec certificate used in the associated clients. |
-c | Performs a conversion from a Linux IPSec configuration file to an AIX® IPSec configuration file in XML format. It requires as input one or two files from the Linux environment, a configuration file, and possibly a secrets file with pre-shared keys.
|
-x | Performs an expunge operation on the database. This flag empties the database. This flag is invalid if the -R flag is also present on the command line. |
-o | Performs an output of the DTD that specifies all elements and attributes for an XML file that is used by the ikedb command. The DTD is sent to stdout. When -R switch is present, DTD that specifies all the elements and attribute for the XML file allowed to be stored as part of configuration policy on LDAP is sent to stdout. |
-A | Associates the IP addresses provided with the policy name. If no IP addresses are provided, the first local IPV6 address for the local host is selected and associated with the policy. Policy configuration is enforced by downloading the XML file from LDAP and putting it into the database. The tunnels thus defined are activated.
|
-D | Performs disassociation of configuration policy and IP on LDAP server. This flag is invalid without the -R switch. The only valid value for the R switch is LDAP.
|
Item | Description |
---|---|
/usr/samples/ipsec | Examples of an XML file that sets up various tunnel configurations. |
ikedb -pFs peer_tunnel_conf.xml
peer_tunnel_conf.xml is the XML file generated on a peer machine.
ikedb -gr -t IKETunnel -n tunnel_sys1_and_sys2
ikedb -d -t IKEPresharedKey
ikedb -R LDAP -A Pol1 -f ldap.xml -h 10.10.10.1 -C /C=US/O=IBM/CN=test01.austin.ibm.com